Author |
---|
E-Mail: rolf.oppliger@esecurity.ch
Phone/Fax: +41 079 654 84 37
Aims and Scope |
---|
Target Audience |
---|
Table of Contents |
---|
1. Introduction
2. Cryptographic Systems
Part I: Unkeyed Cryptosystems
3. One-Way Functions
4. Cryptographic Hash Functions
5. Random Bit Generators
Part II: Secret Key Cryptosystems
6. Symmetric Encryption Systems
7. Message Authentication Systems
8. Pseudorandom Bit Generators
9. Pseudorandom Functions
Part III: Public Key Cryptosystems
10. Asymmetric Encryption Systems
11. Digital Signature Systems
12. Key Establishment
13. Entity Authentication
14. Secure Multi-Party Computation
Part IV: Conclusions
15. Key Management
16. Summary
17. Outlook
Appendix A: Discrete Mathematics
Appendix B: Probability Theory
Appendix C: Information Theory
Appendix D: Complexity Theory
List of Symbols
Abbreviations and Acronyms
About the Author
Index
Reviews |
---|
Errata List |
---|